Inproceedings (zhu2010attacks)
Zhu, B. B.; Yan, J.; Li, Q.; Yang, C.; Liu, J.; Xu, N.; Yi, M. & Cai, K.
Attacks and design of image recognition CAPTCHAs
ACM, 2010, 187-200

Article (obiedkov2009building)
Obiedkov, S.; Kourie, D. G. & Eloff, J.
Building access control models with attribute exploration
Computers and Security, 2009, 28, 2-7

Inproceedings (srinivasan2008protecting)
Srinivasan, V.; Stankovic, J. & Whitehouse, K.
Protecting your daily in-home activity information from a wireless snooping attack
ACM, 2008, 202-211

Article (vonahn2008recaptcha)
von Ahn, L.; Maurer, B.; McMillen, C.; Abraham, D. & Blum, M.
reCAPTCHA: Human-Based Character Recognition via Web Security Measures
Science, 2008, 321, 1465-1468

Incollection (becker2000conceptual)
Becker, K.; Stumme, G.; Wille, R.; Wille, U. & Zickwolff, M.
Dieng, R. & Corby, O. (ed.)
Conceptual Information Systems Discussed through an IT-Security Tool
Springer, 2000, 1937, 352-365